00000000

The file 00000000 has been detected as a potentially unwanted program by 23 anti-malware scanners. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. While running, it connects to the Internet address server-54-192-54-86.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
Version:
1.1.5.89

MD5:
684ee4c993e426b8a3ad5ebd010144ac

SHA-1:
5c34c5d57dae1953e127b65a8727a64d61f68816

SHA-256:
fd2910b63e762644eecdc73f5b7910704ca186429bc68825a00d97f8ce2fafaf

Scanner detections:
23 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 5:32:39 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Mikey.12680
594

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetize
2015.06.21

Avira AntiVirus
ADWARE/Amonetize.Gen7
8.3.1.6

Arcabit
Trojan.Mikey.D3188
1.0.0.425

avast!
Win32:Amonetize-JX [PUP]
150602-1

AVG
Adware BundleApp.CGF
2015.0.4355

Bitdefender
Gen:Variant.Mikey.12680
1.0.20.855

Bkav FE
HW32.Packed
1.3.0.6379

Dr.Web
Trojan.Amonetize.2903
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Mikey.12680
10.0.0.5366

ESET NOD32
Win32/Amonetize.EK potentially unwanted application
7.0.302.0

F-Prot
W32/S-09885d40
v6.4.7.1.166

F-Secure
Gen:Variant.Mikey.12680
5.14.151

G Data
Gen:Variant.Mikey.12680
15.6.25

IKARUS anti.virus
AdWare.BundleApp
t3scan.1.9.5.0

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
15.0.0.543

MicroWorld eScan
Gen:Variant.Mikey.12680
16.0.0.513

NANO AntiVirus
Riskware.Win32.Amonetize.drfzdf
0.30.24.2086

Norman
Gen:Variant.Mikey.12680
02.06.2015 14:23:46

Panda Antivirus
Trj/Genetic.gen
15.06.20.02

Vba32 AntiVirus
AdWare.Amonetize
3.12.26.4

Zillya! Antivirus
Adware.Amonetize.Win32.3434
2.0.0.2238

File size:
882.5 KB (903,680 bytes)

Product version:
1.1.5.89

Original file name:
setup.exe

Common path:
C:\users\{user}\appdata\local\google\chrome\user data\default\file system\007\t\00\00000000

File PE Metadata
Compilation timestamp:
4/29/2015 5:00:00 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:F+pWVoTMGvzeU1Fdn1J5MS4owJ8CbV1kpzxYG:FmWVoTMgeUxn1YpD8CB1QzxX

Entry address:
0xDC17

Entry point:
E8, C3, 27, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 55, 8B, EC, 57, 56, 8B, 75, 0C, 8B, 4D, 10, 8B, 7D, 08, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, A0, 01, 00, 00, 81, F9, 80, 00, 00, 00, 72, 1C, 83, 3D, 18, 1E, 34, 00, 00, 74, 13, 57, 56, 83, E7, 0F, 83, E6, 0F, 3B, FE, 5E, 5F, 75, 05, E9, 97, 07, 00, 00, F7, C7, 03, 00, 00, 00, 75, 14, C1, E9, 02, 83, E2, 03, 83, F9, 08, 72, 29, F3, A5, FF, 24, 95, A0, DD, 31, 00, 8B, C7, BA, 03, 00, 00, 00...
 
[+]

Entropy:
7.7167  (probably packed)

Code size:
146.5 KB (150,016 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-52-163.jfk6.r.cloudfront.net  (54.230.52.163:80)

TCP (HTTP):
Connects to server-54-192-54-86.jfk6.r.cloudfront.net  (54.192.54.86:80)

TCP (HTTP):
Connects to ec2-54-225-244-105.compute-1.amazonaws.com  (54.225.244.105:80)

Remove 00000000 - Powered by Reason Core Security